0% found this document useful (0 votes)
50 views14 pages

Aes Rsa

The document outlines the processes of asymmetric (RSA) and symmetric (AES) encryption for secure communication, detailing the steps for key generation, session key exchange, and establishing a secure connection between client and server. It also explains the use of digital signatures for ensuring message integrity, authentication, and nonrepudiation, including how a server sends a message and its hash, which is then verified by the client. Overall, the document serves as a guide to understanding encryption methods and digital signatures in CyberChef.

Uploaded by

olti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views14 pages

Aes Rsa

The document outlines the processes of asymmetric (RSA) and symmetric (AES) encryption for secure communication, detailing the steps for key generation, session key exchange, and establishing a secure connection between client and server. It also explains the use of digital signatures for ensuring message integrity, authentication, and nonrepudiation, including how a server sends a message and its hash, which is then verified by the client. Overall, the document serves as a guide to understanding encryption methods and digital signatures in CyberChef.

Uploaded by

olti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CyberChef

Asymmetric & Symmetric


Encryption

Digital Signature

Page 1
Asymmetric Encryption (RSA)

Establish secure
communication by
exchanging the public
keys. Only the intended recipient
can decrypt the message.

Symmetric Encryption (AES)

Ensures a secure
communication tunnel by
using a shared session key
for encrypting and
decrypting between client
and server.

Page 2
CyberChef

1. Generate asymmetric keys:


RSA key pair

Page 3
2. Generate the Session Key for
Symmetric Encryption (AES):

a. Main AES key generation (32 bytes)

Session key

b. Initialization vector generation (IV) (16


bytes)

Page 4
3. The client initialize the connection and
specifies the encryption protocols: "Hello!"

4. Server replies with


the certificate and the public key: "Hello!"

Page 5
5. The client verifies certificate's authenticity
and replies with the
session key which is encrypted
with the server's public key:

Session key

Encrypted Session key

Page 6
6. Server decrypts the session key using its
private key:

Encrypted Session key

Session key

Page 7
7. The connection between server and client is
securely established and
encrypted / decrypted with the
symmetric key:

Message

Session key

Encrypted message
with session key

Encrypted message
with session key

Session key

Message decrypted

Page 8
Digital signature
ensures integrity, authentication, and
nonrepudiation

When it is used:

1. Message integrity

To ensure a message /
document is authentic
and hasn't been tampered
by a threat actor

2. Software authenticity

To confirm software is genuine and


unaltered
from the original sender

Page 9
1. The server sends:

the message: This is the message. If you can


decrypt it, you know it is from me.

the hash of the message

Message

Hash of the message

Page 10
(the hash of the message) which is
encrypted with the server's private key - Digital
Signature

Hash of the message

Digital Signature

Page 11
2. The Client:

receives the message and recreates the hash

verifies the digital signature using the server's


public key:

Hash of the message

Digital Signature

Page 12
The digital signature was
successfully verified:

Authentication: The public key matches


the private key
used to create the signature.

Integrity: The computed hash matches the


received hash,
confirming the message's integrity.

Nonrepudiation: The sender cannot deny


having created the signature.

Page 13
Thank you!

Curious to learn more?


Try it yourself with CyberChef!

Page 14

You might also like